Chris Brzuska
Chris Brzuska
Dirección de correo verificada de aalto.fi - Página principal
TítuloCitado porAño
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
International Workshop on Public Key Cryptography, 317-336, 2009
1332009
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Annual Cryptology Conference, 51-70, 2011
1162011
Redactable signatures for tree-structured data: definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1072010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
International Workshop on Public Key Cryptography, 444-461, 2010
852010
Composability of Bellare-Rogaway key exchange protocols
C Brzuska, M Fischlin, B Warinschi, SC Williams
Proceedings of the 18th ACM conference on Computer and communications …, 2011
552011
Less is more: Relaxed yet composable security notions for key exchange
C Brzuska, M Fischlin, NP Smart, B Warinschi, SC Williams
International Journal of Information Security 12 (4), 267-297, 2013
512013
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Annual Cryptology Conference, 188-205, 2014
422014
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
European Public Key Infrastructure Workshop, 178-193, 2012
422012
Downgrade resilience in key-exchange protocols
K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ...
2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016
362016
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
332013
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
European Public Key Infrastructure Workshop, 12-30, 2013
322013
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2014
312014
Sanitizable signatures: How to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schröder
BIOSIG 2009: biometrics and electronic signatures, 2009
292009
Using indistinguishability obfuscation via UCEs
C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2014
272014
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
International Conference on the Theory and Application of Cryptology and …, 2013
272013
Random-oracle uninstantiability from indistinguishability obfuscation
C Brzuska, P Farshim, A Mittelbach
Theory of Cryptography Conference, 428-455, 2015
212015
On the foundations of key exchange
C Brzuska
Technische Universität, 2013
172013
On basing size-verifiable one-way functions on NP-hardness
A Bogdanov, C Brzuska
Theory of Cryptography Conference, 1-6, 2015
162015
Safely exporting keys from secure channels
C Brzuska, H Jacobsen, D Stebila
Annual International Conference on the Theory and Applications of …, 2016
142016
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation.
C Brzuska, A Mittelbach
IACR Cryptology ePrint Archive 2015, 581, 2015
112015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20